EP0709760B1 - Data copyright management system - Google Patents
Data copyright management system Download PDFInfo
- Publication number
- EP0709760B1 EP0709760B1 EP95116820A EP95116820A EP0709760B1 EP 0709760 B1 EP0709760 B1 EP 0709760B1 EP 95116820 A EP95116820 A EP 95116820A EP 95116820 A EP95116820 A EP 95116820A EP 0709760 B1 EP0709760 B1 EP 0709760B1
- Authority
- EP
- European Patent Office
- Prior art keywords
- data
- key
- secret
- encrypted
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
- 238000000034 method Methods 0.000 claims description 16
- 238000007726 management method Methods 0.000 claims description 11
- 230000005540 biological transmission Effects 0.000 description 7
- 238000004891 communication Methods 0.000 description 7
- 238000012546 transfer Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 238000004590 computer program Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 101150097759 CKS1 gene Proteins 0.000 description 1
- 241000282414 Homo sapiens Species 0.000 description 1
- 238000007906 compression Methods 0.000 description 1
- 230000006835 compression Effects 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000013144 data compression Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 230000014509 gene expression Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0464—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload using hop-by-hop encryption, i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/60—Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client
- H04N21/63—Control signaling related to video distribution between client, server and network components; Network processes for video distribution between server and clients or between remote clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
- H04N21/633—Control signals issued by server directed to the network components or client
- H04N21/6332—Control signals issued by server directed to the network components or client directed to client
- H04N21/6334—Control signals issued by server directed to the network components or client directed to client for authorisation, e.g. by transmitting a key
- H04N21/63345—Control signals issued by server directed to the network components or client directed to client for authorisation, e.g. by transmitting a key by transmitting keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/91—Television signal processing therefor
- H04N5/913—Television signal processing therefor for scrambling ; for copy protection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/16—Analogue secrecy systems; Analogue subscription systems
- H04N7/162—Authorising the user terminal, e.g. by paying; Registering the use of a subscription channel, e.g. billing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2211/00—Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
- G06F2211/007—Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2211/00—Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
- G06F2211/007—Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
- G06F2211/008—Public Key, Asymmetric Key, Asymmetric Encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2117—User registration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/605—Copy protection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/101—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measures for digital rights management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/91—Television signal processing therefor
- H04N5/913—Television signal processing therefor for scrambling ; for copy protection
- H04N2005/91357—Television signal processing therefor for scrambling ; for copy protection by modifying the video signal
- H04N2005/91364—Television signal processing therefor for scrambling ; for copy protection by modifying the video signal the video signal being scrambled
Definitions
- the present invention relates to a system for managing the copyright for the use of digital data, that is, the display, storage, copying, edition, and transmission of such data, which is particularly applicable to a multimedia system.
- picture data contains a significantly larger amount of information than character data or audio data, it cannot be stored, transmitted, or subjected to various processings by computers in its original form.
- JPEG Joint Photographic Image Coding Experts Group
- H. 261 H. 261
- MPEGI Moving Picture Image Coding Experts Group 1
- MPEG2 MPEG2 standards for both existing television broadcasting and future high-precision television broadcasting.
- a database not only has its contents referenced but is also used to effectively use data obtained through storing, copying, and edition and transfer edited data to a different user through copying or transmission, or to receive and register new data to a database.
- databases in multimedia system contain audio and picture data that is inherently analog, in addition to character data.
- Japanese Patent Application 1994-46419 and Japanese Patent Application 1994-141004 a system for managing the copyright by forcing the user to acquire a permit key from the key control center through a public telephone line, and in Japanese Patent Application 1994-132916 an apparatus for this purpose.
- Japanese Patent Application 1994-64889 a copyright management method applicable to both the primary use of a database system such as the display (including audio output) and storage of digital data and the secondary use such as copying, edition, and transmission, including the realtime transmission of digital picture.
- this database copyright management method uses in the database system a program and copyright information required to manage the copyright in addition to a key for permitting to use which is transmitted to the user.
- the copyright management program watches and manages to prevent users from using other than the conditions of users' request or permission.
- the inventors have also proposed in Japanese Patent Application 1994-237673 a database copyright management system for specifically implementing the database copyright management method proposed in Japanese Patent Application 1994-64889 described above.
- the system proposed in Japanese Patent Application 1994-237673 comprises a key management center that manages a crypt key K and a copyright management center that manages the database copyright.
- all the data delivered from a database is encrypted by a first crypt key K1
- a primary user who wishes to uses data directly from the database requests the key management center for the key K corresponding to the specific usage by presenting information 11 on the user to the center.
- the key management center transfers the information 11 on the user to the copyright management center.
- the copyright management center transfers this information 11 with a copyright management program Pc to the key control center.
- the key control center On receiving the copyright management program Pc, the key control center transfers the first crypt key K1 and a second crypt key K2 corresponding to the specific usage together with the copyright management program Pc to the primary user via a communication network. On receiving the first crypt key K1. the primary user uses this key to decrypt the data. The user subsequently uses the second crypt key K2 to encrypt and decrypt data when storing, copying or transmitting the data.
- the first and second crypt keys K1 and K2 are disued. If the primary user wishes to use the data again, the first and second crypt keys K1 and K2 are re-delivered to the user from the copyright management center. The redelivery of the second crypt key K2 indicates a confirmation that the data has been copied or transferred to a secondary user, and this is recorded in the copyright management center.
- the secondary user In requesting a secondary usage to the copyright management center the secondary user presents the information 11 on the primary user and information 10 on the original copyright to the copyright management center.
- the copyright management center transmits to the secondary user a permit key Kp corresponding to the specific usage with a second crypt key K2 (viewing permit key), a third crypt key K3 (a permit key corresponding to the specific usage), and the copyright management program Pc which have been encrypted.
- Typical means used for encrypting data include secret-key cryptosystem and public-key cryptosystem.
- the secret-key cryptosystem uses the same secret crypt key Ks for both encryption and decryption:
- C m K s E ( K s , M )
- M D ( K s , C m k s ) .
- a key for encryption is open as a public-key, while a key for decryption is not open and is called a private-key.
- the inventors have proposed an invention that employs a first public-key Kb1, a first private-key Kv1 corresponding to the first public-key Kb1, a second public-key Kb2S. and a second private-key Kv2 corresponding to the second public-key Kb2 which are prepared by the user, and a first secret-key Ks1 and a second secret-key Ks2 prepared by the database.
- a hybrid cryptosystem in which a first user (e.g. a database) sends a first secret key encrypted using a second users public key to the second user.
- the second user decrypts this encrypted first key using his private key and both of them encrypt their communication using the same first secret key.
- This hybrid cryptosystem does not disclose the first user (e.g. the database) sending an encrypted further secret key to the second user, who after decrypting it uses the further secret key to re-encrypt decrypted encrypted data received from the first user (e.g. the database).
- Application 1994-237673 assumes that a single data or database is used in the system, and not that a plurality of data or databases are edited to produce new data.
- the inventors thus proposes in this application a data copyright management system according to claim 1 assuming that a plurality of data or databases are edited to produce new data.
- the secondary user who receives the second crypt key decrypts encrypted secondary data using the second crypt key to use it.
- Figure 1 shows a block diagram of a data copyright management system according to this invention.
- the data stored in the database in this system is not encrypted.
- the embodiment in Japanese Patent Application 1994-237673 uses satellite broadcasting or a storage medium as a means for supplying data.
- databases are shown as a means for supplying data for the convenience of explanation.
- this invention is applicable to the use of satellite, terrestorial wave or CATV broadcasting that is free due to advertisement and the like and this does not require encryption, or a record medium as well as databases as a means for supplying data.
- a primary user copies data obtained and then supplies it to a secondary user, the data does not involve the copyright of the primary user because no modifications have not been made to the data. If, however, the primary user produces new data based on the data obtained or using a means for combining the original data with other data, the new data involves a secondary exploitation for the primary user.
- the new data involves a secondary copyright as secondary exploitation right for the secondary user.
- reference numerals 1, 2, and 3 designate databases that store text data or binary, audio, and/or picture data constituting computer graphics screens or programs, the data which is not encrypted; 9 is a communication line such as a public telephone line provided by a communication enterprise or a CATV line provided by a cable television enterprise; 4 is a primary user terminal; 5 is a secondary user terminal; 6 is a tertiary user terminal; and 7 is an n-th user terminal device.
- reference numeral 8 designates a copyright management center for managing the data copyright.
- primary user terminal 4, secondary user terminal 5, tertiary user terminal 6, and n-th user terminal 7 are connected to a communication line 9.
- encrypted data is transmitted via the path shown by a broken line
- requests are transmitted from the user terminal 4, 5, 6, or 7 to the database 1, 2, or 3 and the copyright management center 8 via the path shown by a solid line
- the permit key, copyright management program, and crypt key corresponding to a specific usage are transmitted from the database 1, 2, or 3 and the copyright management center 8 to the user terminal 4, 5, 6, or 7 via the path shown by an one-dot chain line.
- This embodiment employs a first public-key Kb1, a first private-key Kv1 corresponding to the first public-key Kb1, a second public-key Kb2, and a second private-key Kv2 corresponding to the second public-key Kb2 which are prepared by the user, and a first secret-key Ks1 and a second secret-key Ks2 prepared by the database.
- the database then transmits these encrypted data Cmks1 and the first and the second secret-keys Cks1kb1 and Kcs2kb2 to the user.
- a primary user 4 copies data obtained and then supplies it to a secondary user 5
- the data does not involve the copyright of the primary user 4 because no modifications have not been made to the data. If, however, the primary user 4 produces new data based on the data obtained or using a means for combining the original data with other data, the new data involves a secondary exploitation right for the primary user 4, and the primary user 4 has the original copyright for this secondary work.
- the secondary user 5 produces new data based on the data obtained from the primary user 4 or combining with other data
- the new data involves a secondary exploitation right for the secondary user 5
- the secondary user 5 has the original copyright of this secondary work.
- the databases 1, 2, and 3 store text data or binary, digital audio, or digital picture data constituting computer graphics screens or programs, the data which is not encrypted. This data is encrypted and supplied to the user terminal 4 via the communication line 8 during a data reading operation in response to a request from the primary user terminal 4.
- the data copyright obtained from the database is managed by the method described in Japanese Patent Application 1994-237673 or in the application submitted simultaneously with this application.
- This copyright management system employs a first public-key Kb1, a first private-key Kv1 corresponding to the first public-key Kb1, a second public-key Kb2, and a second private-key Kv2 corresponding to the second public-key Kb2 which are prepared by the user, and a first and a second secret-keys Ks1, Ks2 prepared by the database.
- the database then transmits these encypted data and first and second secret-keys Cks1kb1, Cks2kb2 to the user.
- the primary user 4 extracts parts M4, M5 and M6 constituting data from a plurality of data M1, M2 and M3 obtained from one or more databases, and produces new data M7 from these parts M4, M5 and M6.
- the primary user 4 supplies the new data M7 to the secondary user 5;
- the new data M7 involves a secondary coyright associated with the edition of original data M1, M2 and M3 as well as the original copyright for the original data M1, M2 and M3 from which the parts M4, M5 and M6 produces new data M7.
- the original data M1, M2 and M3 are encrypted using the second secret-key Ks2 supplied with each of data M1, M2 and M3 when used for operation other than display; i.e.. storage, edition, copying or transmission:
- C m 1 k s 2 E ( K s 2 , M 1 )
- C m 2 k s 2 E ( K s 2 , M 2 )
- C m 3 k s 2 E ( K s 2 , M 3 ) .
- the data M4, M5 and M6, parts of original data are also encrypted using the second secret-key Ks2 supplied with each data when used for operation other than display:
- C m 4 k s 2 E ( K s 2 , M 1 )
- C m 5 k s 2 E ( K s 2 , M 2 )
- C m 6 k s 2 E ( K s 2 , M 3 ) .
- the new data comprises the original data and the process that the data has been edited.
- the edition of data is represented by original data and an edition process for it. Furthermore, the original data and edition process can be represented by a computer program and the data written in the computer program.
- the program and data that have been an entire unit are referred to as "object”, and the computer processing about objects is called an object-oriented technology, which has recently become most popular among the computer technologies.
- the technique for producing new data from a plurality of data parts is called a frame work or scenario; the "Object Linking and Embedding” (OLE) program from Microsoft Corp. and “OpenDoc” from Apple Computer Inc. are typical examples.
- OLE Object Linking and Embedding
- This invention treats as objects the relationship between original data parts and a frame work or scenario constituting an edition process in addition to the original data parts.
- the secondary user 5 Upon receipt of the encrypted original data parts Cm4ks2, Cm5ks2 and Cm6ks2. and the edition program Pe, the secondary user 5 requests second secret-key Ks2 for decryption of the encrypted original data parts Cm4ks2, Cm5ks2 and Cm6ks2 to the copyright management center 8, by presenting the edition program Pe with digital signature.
- the digital signature Spe presented to the copyright management center 8 is registered in the center as a valid procedure for authorizing secondary copyright owner.
- This system may limit appropriate n-order usage according to determination in practice by the database or original copyright owner, not permanetly repated usage from primary use till n-order use, and may make data which has been used certain-order be registered as next original data.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Multimedia (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Technology Law (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Facsimile Transmission Control (AREA)
Description
- The present invention relates to a system for managing the copyright for the use of digital data, that is, the display, storage, copying, edition, and transmission of such data, which is particularly applicable to a multimedia system.
- As more and more information is available, database systems wherein many computers, which independently stored various data, are connected via communication lines to use the data mutually are becowing increasingly popular.
- Such database systems has been so far possible to process only coded information containing a small amount of information which can be processed by conventional computers and at the most monochrome binary data such as facsimile information, and failing to handle natural and moving pictures that include a substantially large amount of information.
- Digital processing techniques for various electric signals are being developed, and efforts are being made to apply such techniques to those dynamic picture signals other than binary data which were processed as analog signals.
- Since the digitalization of picture signals enables picture signals such as television signals to be handled by computers, people are viewing as a promising technique a "multimedia system" that can deal with both various data that can be processed by computers and picture data that is digitalized picture signals.
- Since picture data contains a significantly larger amount of information than character data or audio data, it cannot be stored, transmitted, or subjected to various processings by computers in its original form.
- Attempts have thus been made to compression/expansion picture data, and some picture data compression/expansion standards have been prepared. These standards include the following common standards: the Joint Photographic Image Coding Experts Group (JPEG) standards for still pictures, the H. 261 standards for video conferences, the Moving Picture Image Coding Experts Group 1 (MPEGI) standards for picture storage, and the MPEG2 standards for both existing television broadcasting and future high-precision television broadcasting.
- These techniques have enabled digital picture data to be processed in real time.
- Since analog data, which is conventionally popular, is degraded each time at is stored, copied, edited, and transmitted, little notice has been taken of the control of the copyright associated with these operations. Digital data, however, is not degraded after repeated storage, copying, edition, and transmission, such control is significant.
- There has been no adequate method for controlling the copyright for digital data; the copyright is managed based on the copyright law or relevant contracts. The copyright law simply establishes a compensation system for digital recording equipment.
- A database not only has its contents referenced but is also used to effectively use data obtained through storing, copying, and edition and transfer edited data to a different user through copying or transmission, or to receive and register new data to a database.
- Although conventional databases have dealt with only character data, databases in multimedia system contain audio and picture data that is inherently analog, in addition to character data.
- Under these circumstances, the control of the copyright for data in databases is very important, but no copyright management means that is particularly applicable to secondary use such as copying, edition, and transmission has been completed.
- The inventors have proposed in Japanese Patent Application 1994-46419 and Japanese Patent Application 1994-141004 a system for managing the copyright by forcing the user to acquire a permit key from the key control center through a public telephone line, and in Japanese Patent Application 1994-132916 an apparatus for this purpose.
- By improving these inventions, the inventors have also proposed in Japanese Patent Application 1994-64889 a copyright management method applicable to both the primary use of a database system such as the display (including audio output) and storage of digital data and the secondary use such as copying, edition, and transmission, including the realtime transmission of digital picture.
- To manage the copyright for a database system this database copyright management method uses in the database system a program and copyright information required to manage the copyright in addition to a key for permitting to use which is transmitted to the user.
- The copyright management program watches and manages to prevent users from using other than the conditions of users' request or permission.
- The inventors have also proposed in Japanese Patent Application 1994-237673 a database copyright management system for specifically implementing the database copyright management method proposed in Japanese Patent Application 1994-64889 described above.
- The system proposed in Japanese Patent Application 1994-237673 comprises a key management center that manages a crypt key K and a copyright management center that manages the database copyright. According to this system, all the data delivered from a database is encrypted by a first crypt key K1, and a primary user who wishes to uses data directly from the database requests the key management center for the key K corresponding to the specific usage by presenting information 11 on the user to the center. In response to the primary usage request from the primary user, the key management center transfers the information 11 on the user to the copyright management center. On receiving the information 11, the copyright management center transfers this information 11 with a copyright management program Pc to the key control center. On receiving the copyright management program Pc, the key control center transfers the first crypt key K1 and a second crypt key K2 corresponding to the specific usage together with the copyright management program Pc to the primary user via a communication network. On receiving the first crypt key K1. the primary user uses this key to decrypt the data. The user subsequently uses the second crypt key K2 to encrypt and decrypt data when storing, copying or transmitting the data.
-
- These expressions are used hereafter in this specification,
- lf data is copied to an external record medium or transmitted without being stored, the first and second crypt keys K1 and K2 are disued. If the primary user wishes to use the data again, the first and second crypt keys K1 and K2 are re-delivered to the user from the copyright management center. The redelivery of the second crypt key K2 indicates a confirmation that the data has been copied or transferred to a secondary user, and this is recorded in the copyright management center.
- In requesting a secondary usage to the copyright management center the secondary user presents the information 11 on the primary user and information 10 on the original copyright to the copyright management center.
- The copyright management center transmits to the secondary user a permit key Kp corresponding to the specific usage with a second crypt key K2 (viewing permit key), a third crypt key K3 (a permit key corresponding to the specific usage), and the copyright management program Pc which have been encrypted.
- Typical means used for encrypting data include secret-key cryptosystem and public-key cryptosystem.
-
- In the public-key crypt system, a key for encryption is open as a public-key, while a key for decryption is not open and is called a private-key. To use this cryptosystem an information provider encrypts using the public-key Kb for a receiver
- In the application submitted simultaneously with this application, the inventors have proposed an invention that employs a first public-key Kb1, a first private-key Kv1 corresponding to the first public-key Kb1, a second public-key Kb2S. and a second private-key Kv2 corresponding to the second public-key Kb2 which are prepared by the user, and a first secret-key Ks1 and a second secret-key Ks2 prepared by the database. The database uses the first secret-key Ks1 to encrypt data M
the database then transmits these encrypted data Cmks1 and the first and the second secret-keys CKs1 and Cks2kb2 to the user;
the user decrypts the first secret-key Ckslkb1 using the first private-keyKv1
and decrypts the encrypted data Cmks1 to use by decrypted first secret-key Ks1
and the encrypted second secret-key Cks2kb2 by the second private-keyKv2
and decrypted second secret-key Ks2 is used for data storage/copy/transfaer after data decryption. - In the textbook, Applied Cryptography Protocols, Algorithms and Source Code in C, Bruce Schneier, John Wiley & Sons Inc., January 1994, page 31, 42-43, a hybrid cryptosystem is described, in which a first user (e.g. a database) sends a first secret key encrypted using a second users public key to the second user. The second user decrypts this encrypted first key using his private key and both of them encrypt their communication using the same first secret key.
- This hybrid cryptosystem does not disclose the first user (e.g. the database) sending an encrypted further secret key to the second user, who after decrypting it uses the further secret key to re-encrypt decrypted encrypted data received from the first user (e.g. the database).
- The database copyright management system proposed in Japanese Patent
- Application 1994-237673 assumes that a single data or database is used in the system, and not that a plurality of data or databases are edited to produce new data.
- The inventors thus proposes in this application a data copyright management system according to
claim 1 assuming that a plurality of data or databases are edited to produce new data. - The secondary user who receives the second crypt key decrypts encrypted secondary data using the second crypt key to use it.
-
- Figure 1 is a block diagram of an embodiment of a data copyright management system according to this invention.
- Figure 2 is an example illustrating of producing new copyrighted data using a plurality of copyrighted data as objects.
- An embodiment of this invention is described with reference to the drawings.
- Figure 1 shows a block diagram of a data copyright management system according to this invention. The data stored in the database in this system is not encrypted.
- In addition to databases, the embodiment in Japanese Patent Application 1994-237673 uses satellite broadcasting or a storage medium as a means for supplying data. In the embodiment shown in this application, however, only databases are shown as a means for supplying data for the convenience of explanation. Of course, however, this invention is applicable to the use of satellite, terrestorial wave or CATV broadcasting that is free due to advertisement and the like and this does not require encryption, or a record medium as well as databases as a means for supplying data.
- If a primary user copies data obtained and then supplies it to a secondary user, the data does not involve the copyright of the primary user because no modifications have not been made to the data. If, however, the primary user produces new data based on the data obtained or using a means for combining the original data with other data, the new data involves a secondary exploitation for the primary user.
- Similarly, if the secondary user produces new data based on the data obtained from the primary user or using a means for combining the original data with other data, the new data involves a secondary copyright as secondary exploitation right for the secondary user.
- In the embodiment shown in the figure,
reference numerals reference numeral 8 designates a copyright management center for managing the data copyright. - The
databases copyright management center 8.primary user terminal 4,secondary user terminal 5, tertiary user terminal 6, and n-th user terminal 7 are connected to acommunication line 9. - In this figure, encrypted data is transmitted via the path shown by a broken line, requests are transmitted from the
user terminal database copyright management center 8 via the path shown by a solid line the permit key, copyright management program, and crypt key corresponding to a specific usage are transmitted from thedatabase copyright management center 8 to theuser terminal - This embodiment employs a first public-key Kb1, a first private-key Kv1 corresponding to the first public-key Kb1, a second public-key Kb2, and a second private-key Kv2 corresponding to the second public-key Kb2 which are prepared by the user, and a first secret-key Ks1 and a second secret-key Ks2 prepared by the database. The database uses the first secret-key Ks1 to encrypt data M
- The user decrypts the encrypted first secret-key Ckslkb1 using the first private-key Kv1
- If a
primary user 4 copies data obtained and then supplies it to asecondary user 5, the data does not involve the copyright of theprimary user 4 because no modifications have not been made to the data. If, however, theprimary user 4 produces new data based on the data obtained or using a means for combining the original data with other data, the new data involves a secondary exploitation right for theprimary user 4, and theprimary user 4 has the original copyright for this secondary work. - Similarly, if the
secondary user 5 produces new data based on the data obtained from theprimary user 4 or combining with other data, the new data involves a secondary exploitation right for thesecondary user 5, and thesecondary user 5 has the original copyright of this secondary work. - The
databases user terminal 4 via thecommunication line 8 during a data reading operation in response to a request from theprimary user terminal 4. - The data copyright obtained from the database is managed by the method described in Japanese Patent Application 1994-237673 or in the application submitted simultaneously with this application.
- A summary of the applications proposed by the inventors of this invention are shown below.
- Both the secret-key and public-key cryptosystems are adopted as crypt methods. Although the use of the public-key cryptosystem in the encryption of data improves the security of encrypted data, the encryption of data containing a large amount of information using the same system requires a significantly long time for decryption and is not practical.
- The amount of information contained in crypt keys, however, is not so large as that in data because such keys must be operated by human beings.
- This copyright management system employs a first public-key Kb1, a first private-key Kv1 corresponding to the first public-key Kb1, a second public-key Kb2, and a second private-key Kv2 corresponding to the second public-key Kb2 which are prepared by the user, and a first and a second secret-keys Ks1, Ks2 prepared by the database.
- The database uses the first secret-key Ks1 to encrypt data M
and further encrypts the first secret-key Ks1 using the first public-key Kb1
and the second secret-key Ks2using the second public-key Kb2 - The user decrypts the encrypted first secret-key Cks1kb1 using the first private-key Kv1
- The edition of a plurality of data to produce new data is described with reference to Figure 2.
- As shown in this figure, the
primary user 4 extracts parts M4, M5 and M6 constituting data from a plurality of data M1, M2 and M3 obtained from one or more databases, and produces new data M7 from these parts M4, M5 and M6. - The
primary user 4 supplies the new data M7 to thesecondary user 5; the new data M7 involves a secondary coyright associated with the edition of original data M1, M2 and M3 as well as the original copyright for the original data M1, M2 and M3 from which the parts M4, M5 and M6 produces new data M7. - The original data M1, M2 and M3 are encrypted using the second secret-key Ks2 supplied with each of data M1, M2 and M3 when used for operation other than display; i.e.. storage, edition, copying or transmission:
- The new data comprises the original data and the process that the data has been edited.
- In the computer technology, the edition of data is represented by original data and an edition process for it. Furthermore, the original data and edition process can be represented by a computer program and the data written in the computer program. The program and data that have been an entire unit are referred to as "object", and the computer processing about objects is called an object-oriented technology, which has recently become most popular among the computer technologies.
- The technique for producing new data from a plurality of data parts is called a frame work or scenario; the "Object Linking and Embedding" (OLE) program from Microsoft Corp. and "OpenDoc" from Apple Computer Inc. are typical examples.
- This invention treats as objects the relationship between original data parts and a frame work or scenario constituting an edition process in addition to the original data parts.
-
- Upon receipt of the encrypted original data parts Cm4ks2, Cm5ks2 and Cm6ks2. and the edition program Pe, the
secondary user 5 requests second secret-key Ks2 for decryption of the encrypted original data parts Cm4ks2, Cm5ks2 and Cm6ks2 to thecopyright management center 8, by presenting the edition program Pe with digital signature. - The data
copyright management center 8 identifies theprimary user 4 from the presented digital signature in the edition program Pe, using first public-key Kb1primary user 4 is a valid user to use the original data to which the second secret-key Ks2 that has been requested corresponds. If theprimary user 4 is a valid user, the copyright management center transmits the second secret-key Ks2 to thesecondary user 5. Otherwise, it does not transmit the second secret-key Ks2 to thesecondary user 5. - The digital signature Spe presented to the
copyright management center 8 is registered in the center as a valid procedure for authorizing secondary copyright owner. - This system may limit appropriate n-order usage according to determination in practice by the database or original copyright owner, not permanetly repated usage from primary use till n-order use, and may make data which has been used certain-order be registered as next original data.
Claims (1)
- A data copyright management method comprising:supplying from a database (1, 2, 3, 11) an encrypted plurality of original data encrypted by using a first secret-key for each original data of the plurality of original data to a primary user terminal (4);supplying from said data base the encrypted first secret-key for each of the original data to the primary user terminal (4);decrypting by the primary user terminal (4) the encrypted first secret-key using a first private key;decrypting the encrypted plurality of original data by the primary user terminal (4) using the decrypted first secret-key for each of the original data to produce a decrypted plurality of original data;producing a plurality of edited data by the primary user terminal (4) as a combination of editing process data and the decrypted plurality of original data, the edited data involving a secondary copyright for the primary user terminal (4) associated with the edition of the original data;supplying from said data base an encrypted further secret-key for each of the plurality of edited data to the primary user terminal (4);decrypting by said user terminal (4) the encrypted further secret-key using a second private key; andencrypting the plurality of edited data using the decrypted further secret-key for each edited data of the plurality of edited data before storing, copying and transferring the plurality of edited data.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP06011072A EP1691316A1 (en) | 1994-10-27 | 1995-10-25 | Data copyright management system |
EP06011071A EP1691315A1 (en) | 1994-10-27 | 1995-10-25 | Data copyright management system |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP26420194 | 1994-10-27 | ||
JP264201/94 | 1994-10-27 |
Related Child Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP06011072A Division EP1691316A1 (en) | 1994-10-27 | 1995-10-25 | Data copyright management system |
EP06011071A Division EP1691315A1 (en) | 1994-10-27 | 1995-10-25 | Data copyright management system |
Publications (3)
Publication Number | Publication Date |
---|---|
EP0709760A2 EP0709760A2 (en) | 1996-05-01 |
EP0709760A3 EP0709760A3 (en) | 1999-02-03 |
EP0709760B1 true EP0709760B1 (en) | 2006-05-31 |
Family
ID=17399897
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP95116820A Expired - Lifetime EP0709760B1 (en) | 1994-10-27 | 1995-10-25 | Data copyright management system |
EP06011071A Withdrawn EP1691315A1 (en) | 1994-10-27 | 1995-10-25 | Data copyright management system |
EP06011072A Withdrawn EP1691316A1 (en) | 1994-10-27 | 1995-10-25 | Data copyright management system |
Family Applications After (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP06011071A Withdrawn EP1691315A1 (en) | 1994-10-27 | 1995-10-25 | Data copyright management system |
EP06011072A Withdrawn EP1691316A1 (en) | 1994-10-27 | 1995-10-25 | Data copyright management system |
Country Status (4)
Country | Link |
---|---|
US (7) | US5646999A (en) |
EP (3) | EP0709760B1 (en) |
JP (2) | JPH08272745A (en) |
DE (1) | DE69535013T2 (en) |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7730324B2 (en) | 1994-04-01 | 2010-06-01 | Makoto Saito | Method for controlling database copyrights |
US7730323B2 (en) | 1994-04-01 | 2010-06-01 | Makoto Saito | Controlling database copyrights |
USRE41657E1 (en) | 1994-10-27 | 2010-09-07 | Makoto Saito | Data management system |
US7801817B2 (en) | 1995-10-27 | 2010-09-21 | Makoto Saito | Digital content management system and apparatus |
US7827109B2 (en) | 1994-10-27 | 2010-11-02 | Makoto Saito | Digital content management system and apparatus |
USRE42163E1 (en) | 1994-04-01 | 2011-02-22 | Intarsia Software Llc | Data management system |
US7986785B2 (en) | 1994-10-27 | 2011-07-26 | Intarsia Software Llc | Data management |
US8024810B2 (en) | 1998-10-15 | 2011-09-20 | Intarsia Software Llc | Method and apparatus for protecting digital data by double re-encryption |
US8438645B2 (en) | 2005-04-27 | 2013-05-07 | Microsoft Corporation | Secure clock with grace periods |
US8595502B2 (en) | 1995-09-29 | 2013-11-26 | Intarsia Software Llc | Data management system |
US8700535B2 (en) | 2003-02-25 | 2014-04-15 | Microsoft Corporation | Issuing a publisher use license off-line in a digital rights management (DRM) system |
US8725646B2 (en) | 2005-04-15 | 2014-05-13 | Microsoft Corporation | Output protection levels |
US8781969B2 (en) | 2005-05-20 | 2014-07-15 | Microsoft Corporation | Extensible media rights |
US9224168B2 (en) | 2004-11-15 | 2015-12-29 | Microsoft Technology Licensing, Llc | Tuning product policy using observed evidence of customer behavior |
US9336359B2 (en) | 2004-10-18 | 2016-05-10 | Microsoft Technology Licensing, Llc | Device certificate individualization |
US9436804B2 (en) | 2005-04-22 | 2016-09-06 | Microsoft Technology Licensing, Llc | Establishing a unique session key using a hardware functionality scan |
Families Citing this family (175)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7313251B2 (en) * | 1993-11-18 | 2007-12-25 | Digimarc Corporation | Method and system for managing and controlling electronic media |
US6122403A (en) | 1995-07-27 | 2000-09-19 | Digimarc Corporation | Computer system linked by using information in data objects |
US6681028B2 (en) | 1995-07-27 | 2004-01-20 | Digimarc Corporation | Paper-based control of computer systems |
US5841978A (en) | 1993-11-18 | 1998-11-24 | Digimarc Corporation | Network linking method using steganographically embedded data objects |
US6574350B1 (en) | 1995-05-08 | 2003-06-03 | Digimarc Corporation | Digital watermarking employing both frail and robust watermarks |
US6681029B1 (en) | 1993-11-18 | 2004-01-20 | Digimarc Corporation | Decoding steganographic messages embedded in media signals |
US6522770B1 (en) | 1999-05-19 | 2003-02-18 | Digimarc Corporation | Management of documents and other objects using optical devices |
US5974141A (en) * | 1995-03-31 | 1999-10-26 | Mitsubishi Corporation | Data management system |
US7302415B1 (en) * | 1994-09-30 | 2007-11-27 | Intarsia Llc | Data copyright management system |
US6002772A (en) * | 1995-09-29 | 1999-12-14 | Mitsubishi Corporation | Data management system |
US6449717B1 (en) | 1994-09-30 | 2002-09-10 | Mitsubishi Corporation | Data copyright management system |
DE69532153T2 (en) * | 1994-09-30 | 2004-09-02 | Mitsubishi Corp. | Data copyright management system |
US6741991B2 (en) | 1994-09-30 | 2004-05-25 | Mitsubishi Corporation | Data management system |
US8094949B1 (en) | 1994-10-21 | 2012-01-10 | Digimarc Corporation | Music methods and systems |
US6789197B1 (en) | 1994-10-27 | 2004-09-07 | Mitsubishi Corporation | Apparatus for data copyright management system |
JPH08263438A (en) * | 1994-11-23 | 1996-10-11 | Xerox Corp | Distribution and use control system of digital work and access control method to digital work |
US6738495B2 (en) * | 1995-05-08 | 2004-05-18 | Digimarc Corporation | Watermarking enhanced to withstand anticipated corruptions |
US6721440B2 (en) | 1995-05-08 | 2004-04-13 | Digimarc Corporation | Low visibility watermarks using an out-of-phase color |
US6760463B2 (en) | 1995-05-08 | 2004-07-06 | Digimarc Corporation | Watermarking methods and media |
US6590996B1 (en) | 2000-02-14 | 2003-07-08 | Digimarc Corporation | Color adaptive watermarking |
US6744906B2 (en) | 1995-05-08 | 2004-06-01 | Digimarc Corporation | Methods and systems using multiple watermarks |
JPH08329011A (en) * | 1995-06-02 | 1996-12-13 | Mitsubishi Corp | Data copyright management system |
US6829368B2 (en) | 2000-01-26 | 2004-12-07 | Digimarc Corporation | Establishing and interacting with on-line media collections using identifiers in media signals |
US6411725B1 (en) | 1995-07-27 | 2002-06-25 | Digimarc Corporation | Watermark enabled video objects |
US6408331B1 (en) | 1995-07-27 | 2002-06-18 | Digimarc Corporation | Computer linking methods using encoded graphics |
US6788800B1 (en) | 2000-07-25 | 2004-09-07 | Digimarc Corporation | Authenticating objects using embedded data |
US7051086B2 (en) | 1995-07-27 | 2006-05-23 | Digimarc Corporation | Method of linking on-line data to printed documents |
US7171018B2 (en) | 1995-07-27 | 2007-01-30 | Digimarc Corporation | Portable devices and methods employing digital watermarking |
US6577746B1 (en) | 1999-12-28 | 2003-06-10 | Digimarc Corporation | Watermark-based object linking and embedding |
US7562392B1 (en) | 1999-05-19 | 2009-07-14 | Digimarc Corporation | Methods of interacting with audio and ambient music |
US6807534B1 (en) | 1995-10-13 | 2004-10-19 | Trustees Of Dartmouth College | System and method for managing copyrighted electronic media |
US7047241B1 (en) | 1995-10-13 | 2006-05-16 | Digimarc Corporation | System and methods for managing digital creative works |
US5943423A (en) * | 1995-12-15 | 1999-08-24 | Entegrity Solutions Corporation | Smart token system for secure electronic transactions and identification |
EP0898777B1 (en) * | 1996-05-15 | 2007-04-11 | Intertrust Technologies Corp | Method and apparatus for accessing content stored on a dvd |
US6978370B1 (en) | 1996-09-03 | 2005-12-20 | Cryptography Research, Inc. | Method and system for copy-prevention of digital copyright works |
US6108637A (en) | 1996-09-03 | 2000-08-22 | Nielsen Media Research, Inc. | Content display monitor |
US5835595A (en) * | 1996-09-04 | 1998-11-10 | At&T Corp | Method and apparatus for crytographically protecting data |
US6006332A (en) * | 1996-10-21 | 1999-12-21 | Case Western Reserve University | Rights management system for digital media |
EP0947072A1 (en) * | 1996-12-12 | 1999-10-06 | Ascom Systec AG | Method for electronically protected storage of data in a data bank |
US6233684B1 (en) * | 1997-02-28 | 2001-05-15 | Contenaguard Holdings, Inc. | System for controlling the distribution and use of rendered digital works through watermaking |
JP3625983B2 (en) * | 1997-03-12 | 2005-03-02 | 三菱商事株式会社 | Data management system |
EP0901282B1 (en) | 1997-09-03 | 2006-06-28 | Hitachi, Ltd. | Method for recording and reproducing electronic watermark information |
JP3638770B2 (en) * | 1997-12-05 | 2005-04-13 | 東京エレクトロンデバイス株式会社 | Storage device with test function |
US6804376B2 (en) | 1998-01-20 | 2004-10-12 | Digimarc Corporation | Equipment employing watermark-based authentication function |
US7689532B1 (en) | 2000-07-20 | 2010-03-30 | Digimarc Corporation | Using embedded data with file sharing |
US7602940B2 (en) | 1998-04-16 | 2009-10-13 | Digimarc Corporation | Steganographic data hiding using a device clock |
US7756892B2 (en) * | 2000-05-02 | 2010-07-13 | Digimarc Corporation | Using embedded data with file sharing |
US8584255B2 (en) * | 1999-05-05 | 2013-11-12 | Sony United Kingdom Limited | Networked conditional access module |
JPH11328033A (en) * | 1998-05-20 | 1999-11-30 | Fujitsu Ltd | License transfer device |
JP3565715B2 (en) * | 1998-07-02 | 2004-09-15 | 松下電器産業株式会社 | Broadcast system and broadcast transceiver |
JP3216607B2 (en) * | 1998-07-29 | 2001-10-09 | 日本電気株式会社 | Digital work distribution system and method, digital work reproduction apparatus and method, and recording medium |
US6226618B1 (en) * | 1998-08-13 | 2001-05-01 | International Business Machines Corporation | Electronic content delivery system |
US8332478B2 (en) | 1998-10-01 | 2012-12-11 | Digimarc Corporation | Context sensitive connected content |
US6427021B1 (en) | 1998-12-02 | 2002-07-30 | Pitney Bowes Inc. | Recording graphical and tracking information on the face of a mailpiece |
US6408287B1 (en) | 1998-12-02 | 2002-06-18 | Pitney Bowes Inc. | Recording graphical information on the face of a mail piece and placing information about the graphical information in an information-based indicia |
CN1189823C (en) * | 1999-03-03 | 2005-02-16 | 索尼公司 | Data processing device, data processing method, terminal, transmission method for data processing device |
US6868497B1 (en) * | 1999-03-10 | 2005-03-15 | Digimarc Corporation | Method and apparatus for automatic ID management |
US7103574B1 (en) * | 1999-03-27 | 2006-09-05 | Microsoft Corporation | Enforcement architecture and method for digital rights management |
US6973444B1 (en) | 1999-03-27 | 2005-12-06 | Microsoft Corporation | Method for interdependently validating a digital content package and a corresponding digital license |
US6829708B1 (en) | 1999-03-27 | 2004-12-07 | Microsoft Corporation | Specifying security for an element by assigning a scaled value representative of the relative security thereof |
US7073063B2 (en) | 1999-03-27 | 2006-07-04 | Microsoft Corporation | Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out/checking in the digital license to/from the portable device or the like |
US7136838B1 (en) * | 1999-03-27 | 2006-11-14 | Microsoft Corporation | Digital license and method for obtaining/providing a digital license |
US20020019814A1 (en) | 2001-03-01 | 2002-02-14 | Krishnamurthy Ganesan | Specifying rights in a digital rights license according to events |
GB2349548A (en) | 1999-04-27 | 2000-11-01 | Roke Manor Research | Downloading software to mobile telecommunication users |
JP4362888B2 (en) * | 1999-05-18 | 2009-11-11 | ソニー株式会社 | Information processing apparatus and method, and recording medium |
US20020032734A1 (en) | 2000-07-26 | 2002-03-14 | Rhoads Geoffrey B. | Collateral data combined with user characteristics to select web site |
US6981214B1 (en) * | 1999-06-07 | 2005-12-27 | Hewlett-Packard Development Company, L.P. | Virtual editor and related methods for dynamically generating personalized publications |
US8103542B1 (en) | 1999-06-29 | 2012-01-24 | Digimarc Corporation | Digitally marked objects and promotional methods |
JP2001092721A (en) * | 1999-09-17 | 2001-04-06 | Fujitsu Ltd | Device and method for controlling content use and computer readable recording medium having content use control program recorded thereon |
US7194620B1 (en) * | 1999-09-24 | 2007-03-20 | Verizon Business Global Llc | Method for real-time data authentication |
US6876991B1 (en) | 1999-11-08 | 2005-04-05 | Collaborative Decision Platforms, Llc. | System, method and computer program product for a collaborative decision platform |
US6608919B1 (en) | 1999-11-10 | 2003-08-19 | Digimarc Corporation | Method and apparatus for encoding paper with information |
US6625297B1 (en) | 2000-02-10 | 2003-09-23 | Digimarc Corporation | Self-orienting watermarks |
US6834308B1 (en) | 2000-02-17 | 2004-12-21 | Audible Magic Corporation | Method and apparatus for identifying media content presented on a media playing device |
CN1217509C (en) * | 2000-03-30 | 2005-08-31 | 三洋电机株式会社 | Content data storage |
US7200230B2 (en) * | 2000-04-06 | 2007-04-03 | Macrovision Corporation | System and method for controlling and enforcing access rights to encrypted media |
GB0009634D0 (en) * | 2000-04-19 | 2000-06-07 | Infoclear Nv | The info2clear system for on-line copyright management |
US6804377B2 (en) | 2000-04-19 | 2004-10-12 | Digimarc Corporation | Detecting information hidden out-of-phase in color channels |
US7111168B2 (en) | 2000-05-01 | 2006-09-19 | Digimarc Corporation | Digital watermarking systems |
DE10025626A1 (en) * | 2000-05-24 | 2001-11-29 | Deutsche Telekom Ag | Encrypt data to be stored in an IV system |
US7111167B1 (en) | 2000-06-30 | 2006-09-19 | Intel Corporation | Digital watermarks with values derived from remote platforms |
US7039615B1 (en) | 2000-09-28 | 2006-05-02 | Microsoft Corporation | Retail transactions involving digital content in a digital rights management (DRM) system |
WO2002035327A2 (en) * | 2000-10-24 | 2002-05-02 | Nds Limited | Transferring electronic content |
US7606898B1 (en) | 2000-10-24 | 2009-10-20 | Microsoft Corporation | System and method for distributed management of shared computers |
US7113900B1 (en) | 2000-10-24 | 2006-09-26 | Microsoft Corporation | System and method for logical modeling of distributed computer systems |
US7562012B1 (en) | 2000-11-03 | 2009-07-14 | Audible Magic Corporation | Method and apparatus for creating a unique audio signature |
US7359511B2 (en) | 2000-12-18 | 2008-04-15 | Matsushita Electric Industrial Co., Ltd. | Encryption transmission system |
US7266704B2 (en) * | 2000-12-18 | 2007-09-04 | Digimarc Corporation | User-friendly rights management systems and methods |
US8055899B2 (en) | 2000-12-18 | 2011-11-08 | Digimarc Corporation | Systems and methods using digital watermarking and identifier extraction to provide promotional opportunities |
EP1223548A3 (en) * | 2001-01-10 | 2004-02-11 | Monolith Co., Ltd. | Copyright information embedding method and apparatus |
US20020094083A1 (en) * | 2001-01-12 | 2002-07-18 | Prabir Bhattacharya | Encryption scheme for limiting the maximum number of accesses to a digital file of predetermined content |
US7987510B2 (en) * | 2001-03-28 | 2011-07-26 | Rovi Solutions Corporation | Self-protecting digital content |
US20020141582A1 (en) * | 2001-03-28 | 2002-10-03 | Kocher Paul C. | Content security layer providing long-term renewable security |
EP1490767B1 (en) | 2001-04-05 | 2014-06-11 | Audible Magic Corporation | Copyright detection and protection system and method |
JP2003032639A (en) * | 2001-05-09 | 2003-01-31 | Monolith Co Ltd | Image processing method and equipment, and contents recording method capable of being used for the method and the equipment |
US7529659B2 (en) * | 2005-09-28 | 2009-05-05 | Audible Magic Corporation | Method and apparatus for identifying an unknown work |
US7877438B2 (en) | 2001-07-20 | 2011-01-25 | Audible Magic Corporation | Method and apparatus for identifying new media content |
US8972481B2 (en) | 2001-07-20 | 2015-03-03 | Audible Magic, Inc. | Playlist generation method and apparatus |
US7063264B2 (en) | 2001-12-24 | 2006-06-20 | Digimarc Corporation | Covert variable information on identification documents and methods of making same |
US6925475B2 (en) * | 2001-10-12 | 2005-08-02 | Commissariat A L'energie Atomique | Process and apparatus for management of multimedia databases |
US20030105739A1 (en) * | 2001-10-12 | 2003-06-05 | Hassane Essafi | Method and a system for identifying and verifying the content of multimedia documents |
US20030108205A1 (en) * | 2001-12-07 | 2003-06-12 | Bryan Joyner | System and method for providing encrypted data to a device |
US8001052B2 (en) * | 2001-12-10 | 2011-08-16 | Dunkeld Bryan C | System and method for unique digital asset identification and transaction management |
ATE509326T1 (en) | 2001-12-18 | 2011-05-15 | L 1 Secure Credentialing Inc | MULTIPLE IMAGE SECURITY FEATURES FOR IDENTIFYING DOCUMENTS AND METHOD FOR PRODUCING THEM |
US7694887B2 (en) | 2001-12-24 | 2010-04-13 | L-1 Secure Credentialing, Inc. | Optically variable personalized indicia for identification documents |
US7728048B2 (en) | 2002-12-20 | 2010-06-01 | L-1 Secure Credentialing, Inc. | Increasing thermal conductivity of host polymer used with laser engraving methods and compositions |
CA2470600C (en) | 2001-12-24 | 2009-12-22 | Digimarc Id Systems, Llc | Systems, compositions, and methods for full color laser engraving of id documents |
DE10201441A1 (en) * | 2002-01-16 | 2003-08-14 | Infineon Technologies Ag | Pushing device and method for moving |
JP2003224556A (en) * | 2002-01-28 | 2003-08-08 | Toshiba Corp | Communication equipment and communication control method |
JPWO2003067486A1 (en) * | 2002-02-04 | 2005-06-02 | 良貴 蘆田 | Content management system for web links |
JP4335492B2 (en) * | 2002-03-05 | 2009-09-30 | キヤノン株式会社 | Moving picture management method and apparatus |
US7277544B1 (en) * | 2002-05-07 | 2007-10-02 | Cinea, Inc. | Local content security system |
US7824029B2 (en) | 2002-05-10 | 2010-11-02 | L-1 Secure Credentialing, Inc. | Identification card printer-assembler for over the counter card issuing |
US20030221105A1 (en) * | 2002-05-20 | 2003-11-27 | Autodesk, Inc. | Extensible mechanism for attaching digital signatures to different file types |
GB2389204A (en) | 2002-06-01 | 2003-12-03 | Hewlett Packard Co | Updating a trusted information state |
US9349411B2 (en) * | 2002-07-16 | 2016-05-24 | Digimarc Corporation | Digital watermarking and fingerprinting applications for copy protection |
JP2004133576A (en) | 2002-10-09 | 2004-04-30 | Sony Corp | Information processor, content distribution server, license server and method, and computer program |
US7089429B2 (en) * | 2002-11-25 | 2006-08-08 | Nokia Corporation | Creation of local usage rights voucher |
WO2004049242A2 (en) | 2002-11-26 | 2004-06-10 | Digimarc Id Systems | Systems and methods for managing and detecting fraud in image databases used with identification documents |
US7712673B2 (en) | 2002-12-18 | 2010-05-11 | L-L Secure Credentialing, Inc. | Identification document with three dimensional image of bearer |
US8332326B2 (en) | 2003-02-01 | 2012-12-11 | Audible Magic Corporation | Method and apparatus to identify a work received by a processing system |
US7660982B1 (en) | 2003-02-27 | 2010-02-09 | Weinblatt Lee S | Subscription broadcast security system |
US8122106B2 (en) | 2003-03-06 | 2012-02-21 | Microsoft Corporation | Integrating design, deployment, and management phases for systems |
US7072807B2 (en) | 2003-03-06 | 2006-07-04 | Microsoft Corporation | Architecture for distributed computing system and automated design, deployment, and management of distributed applications |
US7689676B2 (en) | 2003-03-06 | 2010-03-30 | Microsoft Corporation | Model-based policy application |
US7890543B2 (en) | 2003-03-06 | 2011-02-15 | Microsoft Corporation | Architecture for distributed computing system and automated design, deployment, and management of distributed applications |
US20060041839A1 (en) * | 2003-04-03 | 2006-02-23 | Peter Kassan | System and method for providing formatted print pages |
US20050270572A1 (en) * | 2003-04-03 | 2005-12-08 | Web Bindery Llc | System and method for virtual print devices for command implementation |
US20060005030A1 (en) * | 2003-04-03 | 2006-01-05 | Web Bindery Llc | System and method for managing copyright information of electronic content |
US20040236640A1 (en) * | 2003-04-03 | 2004-11-25 | Peter Kassan | System for producing on-line content from web sites on demand |
US7225991B2 (en) | 2003-04-16 | 2007-06-05 | Digimarc Corporation | Three dimensional data storage |
AU2004258523B2 (en) * | 2003-07-07 | 2009-12-10 | Irdeto B.V. | Reprogrammable security for controlling piracy and enabling interactive content |
KR100493900B1 (en) * | 2003-08-21 | 2005-06-10 | 삼성전자주식회사 | Method for Sharing Rights Object Between Users |
US7562230B2 (en) * | 2003-10-14 | 2009-07-14 | Intel Corporation | Data security |
US20050154906A1 (en) * | 2003-11-05 | 2005-07-14 | Patrick Kriech | BIOS locked application media |
JP4892977B2 (en) | 2004-01-29 | 2012-03-07 | ソニー株式会社 | Information processing apparatus, information processing method, and computer program |
US7778422B2 (en) * | 2004-02-27 | 2010-08-17 | Microsoft Corporation | Security associations for devices |
CN100388153C (en) * | 2004-03-02 | 2008-05-14 | 吴怡达 | File control apparatus |
US7744002B2 (en) | 2004-03-11 | 2010-06-29 | L-1 Secure Credentialing, Inc. | Tamper evident adhesive and identification document including same |
US7730207B2 (en) * | 2004-03-31 | 2010-06-01 | Microsoft Corporation | Routing in peer-to-peer networks |
US20050246529A1 (en) * | 2004-04-30 | 2005-11-03 | Microsoft Corporation | Isolated persistent identity storage for authentication of computing devies |
US8130746B2 (en) | 2004-07-28 | 2012-03-06 | Audible Magic Corporation | System for distributing decoy content in a peer to peer network |
WO2006020978A2 (en) * | 2004-08-13 | 2006-02-23 | Wink International Llc | Copyright license requesting |
GB0421774D0 (en) | 2004-09-30 | 2004-11-03 | Ttp Communications Ltd | Source code protection |
US7711965B2 (en) * | 2004-10-20 | 2010-05-04 | Intel Corporation | Data security |
JP4186941B2 (en) * | 2005-03-23 | 2008-11-26 | ヤマハ株式会社 | Automatic performance data editing / playback apparatus and program for controlling the same |
JP2006267491A (en) * | 2005-03-23 | 2006-10-05 | Yamaha Corp | Device for reproducing automatic playing data and program for realizing control method thereof |
US7802144B2 (en) | 2005-04-15 | 2010-09-21 | Microsoft Corporation | Model-based system monitoring |
US7797147B2 (en) | 2005-04-15 | 2010-09-14 | Microsoft Corporation | Model-based system monitoring |
US8489728B2 (en) | 2005-04-15 | 2013-07-16 | Microsoft Corporation | Model-based system monitoring |
US9363481B2 (en) | 2005-04-22 | 2016-06-07 | Microsoft Technology Licensing, Llc | Protected media pipeline |
US8549513B2 (en) | 2005-06-29 | 2013-10-01 | Microsoft Corporation | Model-based virtual system provisioning |
US7805375B2 (en) * | 2005-08-22 | 2010-09-28 | Microsoft Corporation | Digital license migration from first platform to second platform |
US7818810B2 (en) * | 2005-10-07 | 2010-10-19 | International Business Machines Corporation | Control of document content having extraction permissives |
US20070083510A1 (en) * | 2005-10-07 | 2007-04-12 | Mcardle James M | Capturing bibliographic attribution information during cut/copy/paste operations |
US8306918B2 (en) * | 2005-10-11 | 2012-11-06 | Apple Inc. | Use of media storage structure with multiple pieces of content in a content-distribution system |
US7941309B2 (en) | 2005-11-02 | 2011-05-10 | Microsoft Corporation | Modeling IT operations/policies |
US8224751B2 (en) | 2006-05-03 | 2012-07-17 | Apple Inc. | Device-independent management of cryptographic information |
CN101449579B (en) * | 2006-07-05 | 2011-10-19 | 艾格瑞系统有限公司 | Systems and methods for enabling consumption of copy-protected content across multiple devices |
US8010803B2 (en) * | 2006-10-12 | 2011-08-30 | Black Duck Software, Inc. | Methods and apparatus for automated export compliance |
WO2008068078A1 (en) * | 2006-12-07 | 2008-06-12 | International Business Machines Corporation | Remote controller having an rfid tag |
US8364597B2 (en) * | 2007-02-07 | 2013-01-29 | Panasonic Corporations | Recording device, server device, recording method, recording medium with computer program recorded therein and integrated circuit |
US8347098B2 (en) | 2007-05-22 | 2013-01-01 | Apple Inc. | Media storage structures for storing content, devices for using such structures, systems for distributing such structures |
US9311492B2 (en) | 2007-05-22 | 2016-04-12 | Apple Inc. | Media storage structures for storing content, devices for using such structures, systems for distributing such structures |
US8006314B2 (en) | 2007-07-27 | 2011-08-23 | Audible Magic Corporation | System for identifying content of digital data |
US20150006411A1 (en) * | 2008-06-11 | 2015-01-01 | James D. Bennett | Creative work registry |
JP2008263644A (en) * | 2008-06-23 | 2008-10-30 | Mitsubishi Corp | Key management method, and key management apparatus |
US8199651B1 (en) | 2009-03-16 | 2012-06-12 | Audible Magic Corporation | Method and system for modifying communication flows at a port level |
JP4544366B2 (en) * | 2009-06-22 | 2010-09-15 | ソニー株式会社 | Content using device and information processing method |
JP5621250B2 (en) * | 2009-12-10 | 2014-11-12 | 富士通株式会社 | Application software protection method and stream editing processing system |
JP2010193506A (en) * | 2010-04-14 | 2010-09-02 | Intarsia Software Llc | Data content distribution system |
US20120185759A1 (en) * | 2011-01-13 | 2012-07-19 | Helen Balinsky | System and method for collaboratively editing a composite document |
US9081778B2 (en) | 2012-09-25 | 2015-07-14 | Audible Magic Corporation | Using digital fingerprints to associate data with a work |
KR102329886B1 (en) * | 2020-11-24 | 2021-11-22 | 주식회사 모블디 | Multidimensional copyright management method and system |
CN113992326B (en) * | 2021-10-26 | 2023-05-16 | 福建师范大学 | Non-interactive image editing validity detection method based on aggregation algorithm |
Family Cites Families (232)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4104721A (en) | 1976-12-30 | 1978-08-01 | International Business Machines Corporation | Hierarchical security mechanism for dynamically assigning security levels to object programs |
US4225884A (en) | 1977-02-14 | 1980-09-30 | Telease, Inc. | Method and system for subscription television billing and access |
US4278837A (en) | 1977-10-31 | 1981-07-14 | Best Robert M | Crypto microprocessor for executing enciphered programs |
US4168396A (en) | 1977-10-31 | 1979-09-18 | Best Robert M | Microprocessor for executing enciphered programs |
JPS54105533A (en) | 1978-02-07 | 1979-08-18 | Canon Inc | Power drive device of camera |
US4352952A (en) | 1978-06-12 | 1982-10-05 | Motorola Inc. | Data security module |
CA1155518A (en) | 1979-02-20 | 1983-10-18 | William S.H. Cheung | Encoding of information |
US4465901A (en) | 1979-06-04 | 1984-08-14 | Best Robert M | Crypto microprocessor that executes enciphered programs |
US4862268A (en) | 1980-03-31 | 1989-08-29 | General Instrument Corporation | Addressable cable television control system with video format data transmission |
US4386233A (en) | 1980-09-29 | 1983-05-31 | Smid Miles E | Crytographic key notarization methods and apparatus |
US4423287A (en) | 1981-06-26 | 1983-12-27 | Visa U.S.A., Inc. | End-to-end encryption system and method of operation |
USRE33189E (en) | 1981-11-19 | 1990-03-27 | Communications Satellite Corporation | Security system for SSTV encryption |
JPS58116571A (en) | 1981-12-29 | 1983-07-11 | 富士通株式会社 | Instruction coding method for microcomputer and microcomputer used for execution thereof |
US4567512A (en) | 1982-08-19 | 1986-01-28 | World Video Library, Inc. | Recorded program communication system |
US4558176A (en) | 1982-09-20 | 1985-12-10 | Arnold Mark G | Computer systems to inhibit unauthorized copying, unauthorized usage, and automated cracking of protected software |
US4588991A (en) | 1983-03-07 | 1986-05-13 | Atalla Corporation | File access security method and means |
EP0121853A3 (en) | 1983-04-04 | 1988-01-13 | BURROUGHS CORPORATION (a Delaware corporation) | Data processing system having public encryption and private decryption keys |
JPS59169000U (en) | 1983-04-27 | 1984-11-12 | 日立照明株式会社 | Lighting equipment switching device |
US4623918A (en) | 1983-05-02 | 1986-11-18 | Teleglobe Pay-Tv System, Inc. | Pay television system utilizing multi-frequency passive filters |
US4613901A (en) | 1983-05-27 | 1986-09-23 | M/A-Com Linkabit, Inc. | Signal encryption and distribution system for controlling scrambling and selective remote descrambling of television signals |
EP0148235B1 (en) | 1983-06-30 | 1988-10-05 | Independent Broadcasting Authority | Encrypted broadcast television system |
GB2143352A (en) | 1983-07-15 | 1985-02-06 | Philips Electronic Associated | Authorising coded signals |
US4625276A (en) * | 1983-08-31 | 1986-11-25 | Vericard Corporation | Data logging and transfer system using portable and resident units |
JPS60102038U (en) | 1983-12-20 | 1985-07-11 | トラスト・トレ−デイング株式会社 | training equipment |
GB2173379B (en) | 1984-02-23 | 1988-01-20 | American Telephone & Telegraph | Method and apparatus for subscription broadcast |
EP0158167A3 (en) * | 1984-03-21 | 1988-05-18 | Atalla Corporation | Document security system, method and apparatus |
US4791565A (en) | 1984-06-20 | 1988-12-13 | Effective Security Systems, Inc. | Apparatus for controlling the use of computer software |
US4751732A (en) | 1984-07-06 | 1988-06-14 | Kabushiki Kaisha Toshiba | Broadcasting system |
US4890319A (en) | 1984-09-21 | 1989-12-26 | Scientific-Atlantic, Inc. | Method for controlling copying of protected information transmitted over a communications link |
US4829569A (en) | 1984-09-21 | 1989-05-09 | Scientific-Atlanta, Inc. | Communication of individual messages to subscribers in a subscription television system |
CA1238427A (en) | 1984-12-18 | 1988-06-21 | Jonathan Oseas | Code protection using cryptography |
US4709266A (en) | 1985-01-14 | 1987-11-24 | Oak Industries Inc. | Satellite scrambling communication network using geographically separated uplinks |
FR2580885B1 (en) | 1985-04-19 | 1988-07-08 | Radiotechnique | SYSTEM FOR THE SECRET TRANSMISSION OF AUDIO SIGNALS, AND TELEVISION FOR RECEIVING SUCH SIGNALS |
EP0341801A3 (en) | 1985-10-29 | 1990-02-07 | Payview Limited | Video scrambling systems |
US4710955A (en) | 1985-11-25 | 1987-12-01 | General Instrument Corporation | Cable television system with two-way telephone communication path |
US4852154A (en) | 1986-02-04 | 1989-07-25 | Pacific Bell | Pay-per-view CATV system |
US4864494A (en) | 1986-03-21 | 1989-09-05 | Computerized Data Ssytems For Mfg., Inc. | Software usage authorization system with key for decrypting/re-encrypting/re-transmitting moving target security codes from protected software |
JPS62169540U (en) | 1986-04-16 | 1987-10-27 | ||
DE3751410T2 (en) | 1986-04-18 | 1996-04-11 | Nagra Plus Sa | Decoder for a television fee system. |
US4890321A (en) | 1986-07-08 | 1989-12-26 | Scientific Atlanta, Inc. | Communications format for a subscription television system permitting transmission of individual text messages to subscribers |
US4799156A (en) | 1986-10-01 | 1989-01-17 | Strategic Processing Corporation | Interactive market management system |
US4759062A (en) | 1986-10-06 | 1988-07-19 | International Electronics Technology Corporation | Arrangement for and method of protecting private security codes from unauthorized disclosure |
US4827508A (en) | 1986-10-14 | 1989-05-02 | Personal Library Software, Inc. | Database usage metering and protection system and method |
US4977594A (en) | 1986-10-14 | 1990-12-11 | Electronic Publishing Resources, Inc. | Database usage metering and protection system and method |
DE3717261A1 (en) | 1987-05-22 | 1987-11-19 | Paul Bamberg | Method for selecting television programmes by telephone |
US4850017A (en) | 1987-05-29 | 1989-07-18 | International Business Machines Corp. | Controlled use of cryptographic keys via generating station established control values |
JPS6461782A (en) | 1987-08-31 | 1989-03-08 | Sharp Kk | Coded record reproducer |
JPS6441387U (en) | 1987-09-08 | 1989-03-13 | ||
US5008853A (en) * | 1987-12-02 | 1991-04-16 | Xerox Corporation | Representation of collaborative multi-user activities relative to shared structured data objects in a networked workstation environment |
US5005200A (en) | 1988-02-12 | 1991-04-02 | Fischer Addison M | Public key/signature cryptosystem with enhanced digital signature certification |
US5003384A (en) | 1988-04-01 | 1991-03-26 | Scientific Atlanta, Inc. | Set-top interface transactions in an impulse pay per view television system |
US4864615A (en) | 1988-05-27 | 1989-09-05 | General Instrument Corporation | Reproduction of secure keys by using distributed key generation data |
US4995080A (en) | 1988-08-04 | 1991-02-19 | Zenith Electronics Corporation | Television signal scrambling system and method |
DE68926200T2 (en) | 1988-08-11 | 1996-10-17 | Ibm | Secret data transmission using control vectors |
US5247575A (en) | 1988-08-16 | 1993-09-21 | Sprague Peter J | Information distribution system |
ATE166986T1 (en) | 1988-08-16 | 1998-06-15 | Cryptologics International Inc | INFORMATION DISTRIBUTION SYSTEM |
JP2783558B2 (en) * | 1988-09-30 | 1998-08-06 | 株式会社東芝 | Summary generation method and summary generation device |
US4916737A (en) | 1988-11-14 | 1990-04-10 | Teleglobe Pay-Tv System, Inc. | Secure anti-piracy encoded television system and method |
US4919545A (en) * | 1988-12-22 | 1990-04-24 | Gte Laboratories Incorporated | Distributed security procedure for intelligent networks |
US4977595A (en) | 1989-04-03 | 1990-12-11 | Nippon Telegraph And Telephone Corporation | Method and apparatus for implementing electronic cash |
JPH0714045Y2 (en) | 1989-04-05 | 1995-04-05 | 日産ディーゼル工業株式会社 | Vehicle intake system |
JPH02268092A (en) | 1989-04-10 | 1990-11-01 | Pioneer Electron Corp | Catv system and catv terminal equipment |
JPH087709B2 (en) | 1989-05-15 | 1996-01-29 | インターナシヨナル・ビジネス・マシーンズ・コーポレーシヨン | Access privilege control method and system |
US5077665A (en) * | 1989-05-25 | 1991-12-31 | Reuters Limited | Distributed matching system |
US5046093A (en) | 1989-09-05 | 1991-09-03 | General Instrument Corporation | CATV subscriber apparatus with intelligent remote control |
ZA907106B (en) | 1989-10-06 | 1991-09-25 | Net 1 Products Pty Ltd | Funds transfer system |
FR2654851B1 (en) | 1989-11-23 | 1992-03-27 | Schlumberger Ind Sa | METHOD AND SYSTEM FOR SECURE OPERATION OF SOFTWARE. |
JPH03214834A (en) | 1990-01-19 | 1991-09-20 | Canon Inc | Multi-medium network system |
US5237610A (en) | 1990-02-01 | 1993-08-17 | Scientific-Atlanta, Inc. | Independent external security module for a digitally upgradeable television signal decoder |
US5029207A (en) | 1990-02-01 | 1991-07-02 | Scientific-Atlanta, Inc. | External security module for a television signal decoder |
JP3143108B2 (en) | 1990-03-13 | 2001-03-07 | 株式会社日立製作所 | File encryption method and file encryption system |
DE69121444T2 (en) | 1990-03-29 | 1997-03-13 | Gte Laboratories Inc | Monitoring system for the transmission of video signals |
JPH03282989A (en) | 1990-03-30 | 1991-12-13 | Tonen Corp | Data storing method using memory card |
JP2943815B2 (en) | 1990-04-06 | 1999-08-30 | 日本電子株式会社 | Length measuring method in electron beam length measuring machine |
US5060262A (en) | 1990-05-07 | 1991-10-22 | Bevins Jr George L | Video scrambling, audio masking and data transmission methods for wireless cable systems |
US5036461A (en) | 1990-05-16 | 1991-07-30 | Elliott John C | Two-way authentication system between user's smart card and issuer-specific plug-in application modules in multi-issued transaction device |
EP0459046A1 (en) | 1990-05-31 | 1991-12-04 | International Business Machines Corporation | Computer software protection |
US5761655A (en) * | 1990-06-06 | 1998-06-02 | Alphatronix, Inc. | Image file storage and retrieval system |
US5204961A (en) | 1990-06-25 | 1993-04-20 | Digital Equipment Corporation | Computer network operating with multilevel hierarchical security with selectable common trust realms and corresponding security protocols |
US5091938B1 (en) | 1990-08-06 | 1997-02-04 | Nippon Denki Home Electronics | Digital data cryptographic system |
US5173939A (en) * | 1990-09-28 | 1992-12-22 | Digital Equipment Corporation | Access control subsystem and method for distributed computer system using compound principals |
US5224163A (en) * | 1990-09-28 | 1993-06-29 | Digital Equipment Corporation | Method for delegating authorization from one entity to another through the use of session encryption keys |
US5220604A (en) * | 1990-09-28 | 1993-06-15 | Digital Equipment Corporation | Method for performing group exclusion in hierarchical group structures |
US5315657A (en) * | 1990-09-28 | 1994-05-24 | Digital Equipment Corporation | Compound principals in access control lists |
US5227893A (en) | 1990-10-31 | 1993-07-13 | International Business Machines Corporation | Pseudo-bar code control of image transmission |
IT1241339B (en) | 1990-12-06 | 1994-01-10 | Sisvel Spa | SYSTEM FOR THE TRANSMISSION AND RECEPTION OF CODED TELEVISION SIGNALS. |
US5142579A (en) | 1991-01-29 | 1992-08-25 | Anderson Walter M | Public key cryptographic system and method |
IL100866A (en) | 1991-02-06 | 1995-10-31 | Igen Inc | Method and apparatus for magnetic microparticulate based luminescence assay including plurality of magnets |
DE69227051T2 (en) | 1991-02-27 | 1999-03-11 | Canon Kk | Procedure for discovering incorrect overwriting of stored data |
US5146497A (en) | 1991-02-27 | 1992-09-08 | Motorola, Inc. | Group rekey in a communication system |
JP2781906B2 (en) | 1991-03-29 | 1998-07-30 | パイオニア株式会社 | CATV center device and program supply method in cable net |
US5504818A (en) | 1991-04-19 | 1996-04-02 | Okano; Hirokazu | Information processing system using error-correcting codes and cryptography |
US5138659A (en) | 1991-05-02 | 1992-08-11 | General Instrument Corporation | Conversion of television signal formats with retention of common control data stream |
US5224162A (en) | 1991-06-14 | 1993-06-29 | Nippon Telegraph And Telephone Corporation | Electronic cash system |
CA2045907C (en) * | 1991-06-28 | 1998-12-15 | Gerald B. Anderson | A method for storing and retrieving annotations and redactions in final form documents |
US5438508A (en) * | 1991-06-28 | 1995-08-01 | Digital Equipment Corporation | License document interchange format for license management system |
FR2681490B1 (en) | 1991-09-12 | 1998-09-18 | Gemplus Card Int | PROCEDURE AND DEVICE FOR CERTIFICATION OF MESSAGES TRANSMITTED BY FAX |
EP0606287B1 (en) | 1991-10-03 | 1999-02-24 | THOMSON multimedia | Method for customizing a device with a smart card |
JPH05122701A (en) | 1991-10-25 | 1993-05-18 | Canon Inc | Charging information processing unit |
US5442778A (en) * | 1991-11-12 | 1995-08-15 | Xerox Corporation | Scatter-gather: a cluster-based method and apparatus for browsing large document collections |
US5453601A (en) | 1991-11-15 | 1995-09-26 | Citibank, N.A. | Electronic-monetary system |
US5457540A (en) | 1992-01-06 | 1995-10-10 | Canon Kabushiki Kaisha | Image processing method and apparatus in which identification information is added based on image density |
WO2004077300A1 (en) | 1992-01-22 | 2004-09-10 | Yoshimasa Kadooka | Ic memory card and protection therefor |
US5442706A (en) | 1992-02-27 | 1995-08-15 | Hughes Aircraft Company | Secure mobile storage |
JP3073590B2 (en) | 1992-03-16 | 2000-08-07 | 富士通株式会社 | Electronic data protection system, licensor's device and user's device |
US5291598A (en) * | 1992-04-07 | 1994-03-01 | Gregory Grundy | Method and system for decentralized manufacture of copy-controlled software |
US5440631A (en) * | 1992-04-24 | 1995-08-08 | Fijitsu Limited | Information distribution system wherein storage medium storing ciphered information is distributed |
JPH05298373A (en) | 1992-04-24 | 1993-11-12 | Olympus Optical Co Ltd | Portable type information terminal equipment |
JP2659896B2 (en) * | 1992-04-29 | 1997-09-30 | インターナショナル・ビジネス・マシーンズ・コーポレイション | Structured document copy management method and structured document copy management device |
JPH05316102A (en) | 1992-05-13 | 1993-11-26 | Mega Chips:Kk | Decoder |
US5349662A (en) | 1992-05-21 | 1994-09-20 | International Business Machines Corporation | Method of and apparatus for providing automatic detection of user activity |
US5515538A (en) | 1992-05-29 | 1996-05-07 | Sun Microsystems, Inc. | Apparatus and method for interrupt handling in a multi-threaded operating system kernel |
US5353351A (en) | 1992-06-09 | 1994-10-04 | At&T Bell Laboratories | Secure teleconferencing |
US5367388A (en) | 1992-07-27 | 1994-11-22 | Scitex Corporation Ltd. | Electronic separation scanner |
JP3217137B2 (en) | 1992-07-28 | 2001-10-09 | 株式会社日立製作所 | Video signal recording device, playback device, and transmission device |
US5323464A (en) * | 1992-10-16 | 1994-06-21 | International Business Machines Corporation | Commercial data masking |
US5319705A (en) * | 1992-10-21 | 1994-06-07 | International Business Machines Corporation | Method and system for multimedia access control enablement |
JPH06141004A (en) | 1992-10-27 | 1994-05-20 | Mitsubishi Corp | Charging system |
FR2698510B1 (en) | 1992-11-26 | 1994-12-23 | Schlumberger Ind Sa | Communication network. |
US5270773A (en) | 1992-11-27 | 1993-12-14 | Xerox Corporation | Image producing device with security to prevent disclosure of sensitive documents |
US5341425A (en) | 1992-12-02 | 1994-08-23 | Scientific Atlanta, Inc. | Methods and apparatus for uniquely encrypting data at a plurality of data transmission sites for transmission to a reception site |
US5465299A (en) * | 1992-12-03 | 1995-11-07 | Hitachi, Ltd. | Electronic document processing system and method of forming digital signature |
US5986690A (en) | 1992-12-09 | 1999-11-16 | Discovery Communications, Inc. | Electronic book selection and delivery system |
US5579223A (en) * | 1992-12-24 | 1996-11-26 | Microsoft Corporation | Method and system for incorporating modifications made to a computer program into a translated version of the computer program |
JPH06223041A (en) | 1993-01-22 | 1994-08-12 | Fujitsu Ltd | Rarge-area environment user certification system |
US6415271B1 (en) | 1993-02-10 | 2002-07-02 | Gm Network Limited | Electronic cash eliminating payment risk |
US5444782A (en) | 1993-03-09 | 1995-08-22 | Uunet Technologies, Inc. | Computer network encryption/decryption device |
US5414772A (en) | 1993-06-23 | 1995-05-09 | Gemplus Development | System for improving the digital signature algorithm |
US5455863A (en) | 1993-06-29 | 1995-10-03 | Motorola, Inc. | Method and apparatus for efficient real-time authentication and encryption in a communication system |
US5428606A (en) | 1993-06-30 | 1995-06-27 | Moskowitz; Scott A. | Digital information commodities exchange |
US5400403A (en) | 1993-08-16 | 1995-03-21 | Rsa Data Security, Inc. | Abuse-resistant object distribution system and method |
US5715393A (en) | 1993-08-16 | 1998-02-03 | Motorola, Inc. | Method for remote system process monitoring |
US5345508A (en) | 1993-08-23 | 1994-09-06 | Apple Computer, Inc. | Method and apparatus for variable-overhead cached encryption |
IL110891A (en) * | 1993-09-14 | 1999-03-12 | Spyrus | System and method for data access control |
US5347581A (en) | 1993-09-15 | 1994-09-13 | Gemplus Developpement | Verification process for a communication system |
US5381480A (en) | 1993-09-20 | 1995-01-10 | International Business Machines Corporation | System for translating encrypted data |
US5410602A (en) | 1993-09-27 | 1995-04-25 | Motorola, Inc. | Method for key management of point-to-point communications |
US5369702A (en) | 1993-10-18 | 1994-11-29 | Tecsec Incorporated | Distributed cryptographic object method |
US5680452A (en) | 1993-10-18 | 1997-10-21 | Tecsec Inc. | Distributed cryptographic object method |
CA2129075C (en) | 1993-10-18 | 1999-04-20 | Joseph J. Daniele | Electronic copyright royalty accounting system using glyphs |
US5841886A (en) | 1993-11-18 | 1998-11-24 | Digimarc Corporation | Security system for photographic identification |
CA2136919A1 (en) | 1993-12-09 | 1995-06-10 | John Timothy Hember | Local area network encryption decryption system |
US5584023A (en) | 1993-12-27 | 1996-12-10 | Hsu; Mike S. C. | Computer system including a transparent and secure file transform mechanism |
US5450493A (en) | 1993-12-29 | 1995-09-12 | At&T Corp. | Secure communication method and apparatus |
US5499340A (en) | 1994-01-12 | 1996-03-12 | Isogon Corporation | Method and apparatus for computer program usage monitoring |
US5666411A (en) | 1994-01-13 | 1997-09-09 | Mccarty; Johnnie C. | System for computer software protection |
GB9400971D0 (en) | 1994-01-19 | 1994-03-16 | Mor Limited | Method of and apparatus for manipulating digital data |
US5509074A (en) * | 1994-01-27 | 1996-04-16 | At&T Corp. | Method of protecting electronically published materials using cryptographic protocols |
US5504816A (en) | 1994-02-02 | 1996-04-02 | Gi Corporation | Method and apparatus for controlling access to digital signals |
US5497420A (en) | 1994-02-07 | 1996-03-05 | Le Groupe Vide/ otron Lte/ e | Cable TV system using passwords |
US5479514A (en) | 1994-02-23 | 1995-12-26 | International Business Machines Corporation | Method and apparatus for encrypted communication in data networks |
US5511121A (en) | 1994-02-23 | 1996-04-23 | Bell Communications Research, Inc. | Efficient electronic money |
EP0674253B1 (en) * | 1994-03-15 | 2003-02-19 | Kabushiki Kaisha Toshiba | Shared file editing system with file content secrecy, version management and asynchronous editing |
JPH07319691A (en) | 1994-03-29 | 1995-12-08 | Toshiba Corp | Resource protective device, privilege protective device, software utilization method controller and software utilization method control system |
JP3139910B2 (en) | 1994-03-31 | 2001-03-05 | 株式会社日立製作所 | Information receiving / recording / reproducing device and information receiving device |
JPH07271865A (en) | 1994-04-01 | 1995-10-20 | Mitsubishi Corp | Method for managing copyright of data base |
US5974141A (en) | 1995-03-31 | 1999-10-26 | Mitsubishi Corporation | Data management system |
US6744894B1 (en) | 1994-04-01 | 2004-06-01 | Mitsubishi Corporation | Data management system |
US7036019B1 (en) | 1994-04-01 | 2006-04-25 | Intarsia Software Llc | Method for controlling database copyrights |
JPH07283809A (en) | 1994-04-08 | 1995-10-27 | Mitsubishi Corp | Ciphering key system |
US5495533A (en) | 1994-04-29 | 1996-02-27 | International Business Machines Corporation | Personal key archive |
US5504817A (en) | 1994-05-09 | 1996-04-02 | Yeda Research And Development Co. Ltd. At The Weizmann Institute Of Science | Method and apparatus for memory efficient variants of public key encryption and identification schemes for smart card applications |
US5515441A (en) | 1994-05-12 | 1996-05-07 | At&T Corp. | Secure communication method and apparatus |
US5475757A (en) | 1994-06-07 | 1995-12-12 | At&T Corp. | Secure data transmission method |
US5577121A (en) | 1994-06-09 | 1996-11-19 | Electronic Payment Services, Inc. | Transaction system for integrated circuit cards |
US6091835A (en) | 1994-08-31 | 2000-07-18 | Penop Limited | Method and system for transcribing electronic affirmations |
US5541994A (en) | 1994-09-07 | 1996-07-30 | Mytec Technologies Inc. | Fingerprint controlled public key cryptographic system |
JP3542088B2 (en) | 1994-09-09 | 2004-07-14 | 富士通株式会社 | Data content utilization system |
US5606609A (en) | 1994-09-19 | 1997-02-25 | Scientific-Atlanta | Electronic document verification system and method |
DE69532153T2 (en) * | 1994-09-30 | 2004-09-02 | Mitsubishi Corp. | Data copyright management system |
US6002772A (en) | 1995-09-29 | 1999-12-14 | Mitsubishi Corporation | Data management system |
US7302415B1 (en) | 1994-09-30 | 2007-11-27 | Intarsia Llc | Data copyright management system |
US6449717B1 (en) | 1994-09-30 | 2002-09-10 | Mitsubishi Corporation | Data copyright management system |
JPH08185448A (en) | 1994-09-30 | 1996-07-16 | Mitsubishi Corp | System and device for managing data copyright |
JPH08101867A (en) | 1994-09-30 | 1996-04-16 | Fujitsu Ltd | Software use permission system |
US6741991B2 (en) | 1994-09-30 | 2004-05-25 | Mitsubishi Corporation | Data management system |
US5864683A (en) | 1994-10-12 | 1999-01-26 | Secure Computing Corporartion | System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting access to data based on user and process access rights |
US6076077A (en) | 1995-10-27 | 2000-06-13 | Mitsubishi Corporation | Data management system |
US6424715B1 (en) | 1994-10-27 | 2002-07-23 | Mitsubishi Corporation | Digital content management system and apparatus |
US6789197B1 (en) | 1994-10-27 | 2004-09-07 | Mitsubishi Corporation | Apparatus for data copyright management system |
EP0709760B1 (en) | 1994-10-27 | 2006-05-31 | Intarsia Software LLC | Data copyright management system |
EP0715241B1 (en) | 1994-10-27 | 2004-01-14 | Mitsubishi Corporation | Apparatus for data copyright management system |
EP0792493B1 (en) * | 1994-11-08 | 1999-08-11 | Vermeer Technologies, Inc. | An online service development tool with fee setting capabilities |
US5634012A (en) | 1994-11-23 | 1997-05-27 | Xerox Corporation | System for controlling the distribution and use of digital works having a fee reporting mechanism |
EP0719045B1 (en) | 1994-12-13 | 2003-10-29 | Mitsubishi Corporation | Crypt key system for secure electronic transactions |
US6182218B1 (en) | 1994-12-13 | 2001-01-30 | Mitsubishi Corporation | Digital content management system using electronic watermark |
US5646997A (en) | 1994-12-14 | 1997-07-08 | Barton; James M. | Method and apparatus for embedding authentication information within digital data |
US5485577A (en) | 1994-12-16 | 1996-01-16 | General Instrument Corporation Of Delaware | Method and apparatus for incremental delivery of access rights |
US5606613A (en) | 1994-12-22 | 1997-02-25 | Pitney Bowes Inc. | Method for identifying a metering accounting vault to digital printer |
US5771383A (en) | 1994-12-27 | 1998-06-23 | International Business Machines Corp. | Shared memory support method and apparatus for a microkernel data processing system |
US6360338B1 (en) | 1995-01-24 | 2002-03-19 | Compaq Computer Corporation | Enhanced instrumentation software in fault tolerant systems |
US5604800A (en) | 1995-02-13 | 1997-02-18 | Eta Technologies Corporation | Personal access management system |
CN100452071C (en) | 1995-02-13 | 2009-01-14 | 英特特拉斯特技术公司 | Systems and methods for secure transaction management and electronic rights protection |
US5642418A (en) | 1995-02-21 | 1997-06-24 | Bell Atlantic Network Services, Inc. | Satellite television system and method |
GB9503738D0 (en) | 1995-02-24 | 1995-04-19 | Int Computers Ltd | Cryptographic key management |
JPH08242229A (en) | 1995-03-01 | 1996-09-17 | Fujitsu Ltd | State matching processing system for monitoring network |
GB9504221D0 (en) | 1995-03-02 | 1995-04-19 | Mor Limited | Method of and apparatus for manipulating digital data works |
US5651064A (en) | 1995-03-08 | 1997-07-22 | 544483 Alberta Ltd. | System for preventing piracy of recorded media |
US5553145A (en) | 1995-03-21 | 1996-09-03 | Micali; Silvia | Simultaneous electronic transactions with visible trusted parties |
KR0160685B1 (en) | 1995-03-31 | 1998-12-15 | 김광호 | Card reader/writer controller of personal computer with illegal use prevention operation by chip-in card |
JPH08328880A (en) | 1995-05-31 | 1996-12-13 | Mitsubishi Electric Corp | Computer operation management system for operating system capable of simultaneous executing of plural application programs |
JPH08329011A (en) | 1995-06-02 | 1996-12-13 | Mitsubishi Corp | Data copyright management system |
US5740549A (en) * | 1995-06-12 | 1998-04-14 | Pointcast, Inc. | Information and advertising distribution system and method |
JPH0922352A (en) | 1995-07-07 | 1997-01-21 | Mitsubishi Electric Corp | Copyright managing device |
US6006328A (en) | 1995-07-14 | 1999-12-21 | Christopher N. Drake | Computer software authentication, protection, and security system |
US5765152A (en) | 1995-10-13 | 1998-06-09 | Trustees Of Dartmouth College | System and method for managing copyrighted electronic media |
US5689587A (en) | 1996-02-09 | 1997-11-18 | Massachusetts Institute Of Technology | Method and apparatus for data hiding in images |
TW313642B (en) | 1996-06-11 | 1997-08-21 | Ibm | A uniform mechanism for using signed content |
SG67354A1 (en) | 1996-06-27 | 1999-09-21 | Inst Of Systems Science Nation | Computationally efficient method for trusted and dynamic digital objects dissemination |
US5889868A (en) | 1996-07-02 | 1999-03-30 | The Dice Company | Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data |
US6044367A (en) * | 1996-08-02 | 2000-03-28 | Hewlett-Packard Company | Distributed I/O store |
US5848155A (en) | 1996-09-04 | 1998-12-08 | Nec Research Institute, Inc. | Spread spectrum watermark for embedded signalling |
US5765176A (en) | 1996-09-06 | 1998-06-09 | Xerox Corporation | Performing document image management tasks using an iconic image having embedded encoded information |
US5825892A (en) | 1996-10-28 | 1998-10-20 | International Business Machines Corporation | Protecting images with an image watermark |
US6519623B1 (en) | 1996-10-31 | 2003-02-11 | International Business Machines Corporation | Generic semaphore for concurrent access by multiple operating systems |
KR20000064791A (en) | 1997-01-27 | 2000-11-06 | 엠. 제이. 엠. 반 캄 | Method and system for transmitting content information and additional information related thereto |
US6026430A (en) * | 1997-03-24 | 2000-02-15 | Butman; Ronald A. | Dynamic client registry apparatus and method |
JP3265241B2 (en) | 1997-09-10 | 2002-03-11 | シャープ株式会社 | Rice cooker and high frequency heating device |
US6587836B1 (en) | 1997-09-26 | 2003-07-01 | Worldcom, Inc. | Authentication and entitlement for users of web based data management programs |
US6160891A (en) | 1997-10-20 | 2000-12-12 | Sun Microsystems, Inc. | Methods and apparatus for recovering keys |
US7024681B1 (en) | 1997-12-04 | 2006-04-04 | Verizon Laboratories Inc. | Method and apparatus for near video on demand |
JPH11234264A (en) | 1998-02-17 | 1999-08-27 | Canon Inc | Electronic papermarking system, electronic information distribution system using the same and storage medium |
US6226618B1 (en) | 1998-08-13 | 2001-05-01 | International Business Machines Corporation | Electronic content delivery system |
JP4763866B2 (en) | 1998-10-15 | 2011-08-31 | インターシア ソフトウェア エルエルシー | Method and apparatus for protecting digital data by double re-encryption |
JP3102417B2 (en) | 1998-10-30 | 2000-10-23 | 富士ゼロックス株式会社 | Image processing apparatus and image processing method |
US6851053B1 (en) | 1999-03-02 | 2005-02-01 | Microsoft Corporation | Multiparty conference authentication |
JP4181282B2 (en) | 1999-09-16 | 2008-11-12 | 株式会社東芝 | Electronic currency terminal |
US6668324B1 (en) | 1999-12-13 | 2003-12-23 | Intel Corporation | System and method for safeguarding data within a device |
US6690459B2 (en) | 2001-03-05 | 2004-02-10 | Trex Enterprises, Corp. | Method and apparatus for fiber alignment using light leaked from cladding |
US6874089B2 (en) | 2002-02-25 | 2005-03-29 | Network Resonance, Inc. | System, method and computer program product for guaranteeing electronic transactions |
JP4268844B2 (en) | 2003-07-15 | 2009-05-27 | Tdk株式会社 | Manufacturing method of multilayer ceramic electronic component and multilayer ceramic electronic component |
JP4181182B2 (en) | 2006-03-08 | 2008-11-12 | ヤンマー農機株式会社 | Normal combine |
-
1995
- 1995-10-25 EP EP95116820A patent/EP0709760B1/en not_active Expired - Lifetime
- 1995-10-25 EP EP06011071A patent/EP1691315A1/en not_active Withdrawn
- 1995-10-25 DE DE69535013T patent/DE69535013T2/en not_active Expired - Lifetime
- 1995-10-25 EP EP06011072A patent/EP1691316A1/en not_active Withdrawn
- 1995-10-27 US US08/549,271 patent/US5646999A/en not_active Expired - Lifetime
- 1995-10-27 JP JP7280985A patent/JPH08272745A/en active Pending
-
1997
- 1997-07-03 US US08/888,074 patent/US6097818A/en not_active Expired - Lifetime
-
2000
- 2000-04-10 US US09/546,177 patent/US6272635B1/en not_active Expired - Lifetime
-
2001
- 2001-06-05 US US09/873,453 patent/US6463536B2/en not_active Expired - Lifetime
-
2002
- 2002-05-23 US US10/152,584 patent/US6721887B2/en not_active Expired - Lifetime
- 2002-06-13 US US10/170,677 patent/USRE41657E1/en not_active Expired - Lifetime
-
2005
- 2005-10-13 JP JP2005298846A patent/JP4101263B2/en not_active Expired - Lifetime
-
2007
- 2007-02-01 US US11/701,943 patent/USRE43599E1/en not_active Expired - Lifetime
Non-Patent Citations (1)
Title |
---|
SCHNEIER B.: "Applied Cryptography, Protocols, Algorithms and Source Code in C", 31 January 1994, JOHN WILEY & SONS, USA * |
Cited By (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
USRE42163E1 (en) | 1994-04-01 | 2011-02-22 | Intarsia Software Llc | Data management system |
US7730323B2 (en) | 1994-04-01 | 2010-06-01 | Makoto Saito | Controlling database copyrights |
US8554684B2 (en) | 1994-04-01 | 2013-10-08 | Intarsia Software Llc | Controlling database copyrights |
US7730324B2 (en) | 1994-04-01 | 2010-06-01 | Makoto Saito | Method for controlling database copyrights |
US7979354B2 (en) | 1994-04-01 | 2011-07-12 | Intarsia Software Llc | Controlling database copyrights |
US8407782B2 (en) | 1994-10-27 | 2013-03-26 | Intarsia Software Llc | Data copyright management |
USRE41657E1 (en) | 1994-10-27 | 2010-09-07 | Makoto Saito | Data management system |
US7986785B2 (en) | 1994-10-27 | 2011-07-26 | Intarsia Software Llc | Data management |
US9245260B2 (en) | 1994-10-27 | 2016-01-26 | Xylon Llc | Data copyright management |
USRE43599E1 (en) | 1994-10-27 | 2012-08-21 | Intarsia Software Llc | Data management system |
US7827109B2 (en) | 1994-10-27 | 2010-11-02 | Makoto Saito | Digital content management system and apparatus |
US8448254B2 (en) | 1994-10-27 | 2013-05-21 | Intarsia Software Llc | Digital content management system and apparatus |
US8595502B2 (en) | 1995-09-29 | 2013-11-26 | Intarsia Software Llc | Data management system |
US7801817B2 (en) | 1995-10-27 | 2010-09-21 | Makoto Saito | Digital content management system and apparatus |
US8024810B2 (en) | 1998-10-15 | 2011-09-20 | Intarsia Software Llc | Method and apparatus for protecting digital data by double re-encryption |
US8700535B2 (en) | 2003-02-25 | 2014-04-15 | Microsoft Corporation | Issuing a publisher use license off-line in a digital rights management (DRM) system |
US8719171B2 (en) | 2003-02-25 | 2014-05-06 | Microsoft Corporation | Issuing a publisher use license off-line in a digital rights management (DRM) system |
US9336359B2 (en) | 2004-10-18 | 2016-05-10 | Microsoft Technology Licensing, Llc | Device certificate individualization |
US9224168B2 (en) | 2004-11-15 | 2015-12-29 | Microsoft Technology Licensing, Llc | Tuning product policy using observed evidence of customer behavior |
US8725646B2 (en) | 2005-04-15 | 2014-05-13 | Microsoft Corporation | Output protection levels |
US9436804B2 (en) | 2005-04-22 | 2016-09-06 | Microsoft Technology Licensing, Llc | Establishing a unique session key using a hardware functionality scan |
US8438645B2 (en) | 2005-04-27 | 2013-05-07 | Microsoft Corporation | Secure clock with grace periods |
US8781969B2 (en) | 2005-05-20 | 2014-07-15 | Microsoft Corporation | Extensible media rights |
Also Published As
Publication number | Publication date |
---|---|
JP4101263B2 (en) | 2008-06-18 |
US6721887B2 (en) | 2004-04-13 |
EP1691315A1 (en) | 2006-08-16 |
USRE41657E1 (en) | 2010-09-07 |
US20020178372A1 (en) | 2002-11-28 |
JPH08272745A (en) | 1996-10-18 |
US6272635B1 (en) | 2001-08-07 |
USRE43599E1 (en) | 2012-08-21 |
US6097818A (en) | 2000-08-01 |
JP2006085725A (en) | 2006-03-30 |
DE69535013D1 (en) | 2006-07-06 |
EP1691316A1 (en) | 2006-08-16 |
EP0709760A2 (en) | 1996-05-01 |
US5646999A (en) | 1997-07-08 |
DE69535013T2 (en) | 2006-12-28 |
EP0709760A3 (en) | 1999-02-03 |
US6463536B2 (en) | 2002-10-08 |
US20010027522A1 (en) | 2001-10-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP0709760B1 (en) | Data copyright management system | |
US8407782B2 (en) | Data copyright management | |
US6789197B1 (en) | Apparatus for data copyright management system | |
EP0752663B1 (en) | Copyright control system | |
US6343283B1 (en) | Data copyright management system | |
US6449717B1 (en) | Data copyright management system | |
US20070038575A1 (en) | Data copyright management system | |
EP0833241A2 (en) | Secure data management system | |
JPH08288940A (en) | Ciphering key system | |
JP4427395B2 (en) | Data management method and data management apparatus | |
JP4099461B2 (en) | Data copyright management device | |
JP4205754B2 (en) | Data management method | |
JPH0787077A (en) | Data ciphering device | |
JP4205709B2 (en) | Key management method and key management apparatus | |
JP2008090849A (en) | Data copyright management apparatus | |
JP2008263644A (en) | Key management method, and key management apparatus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
AK | Designated contracting states |
Kind code of ref document: A2 Designated state(s): DE FR GB |
|
PUAL | Search report despatched |
Free format text: ORIGINAL CODE: 0009013 |
|
AK | Designated contracting states |
Kind code of ref document: A3 Designated state(s): DE FR GB |
|
17P | Request for examination filed |
Effective date: 19990730 |
|
17Q | First examination report despatched |
Effective date: 20010917 |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: INTARSIA SOFTWARE LLC |
|
GRAC | Information related to communication of intention to grant a patent modified |
Free format text: ORIGINAL CODE: EPIDOSCIGR1 |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): DE FR GB |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D |
|
REF | Corresponds to: |
Ref document number: 69535013 Country of ref document: DE Date of ref document: 20060706 Kind code of ref document: P |
|
ET | Fr: translation filed | ||
PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
26N | No opposition filed |
Effective date: 20070301 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: GB Payment date: 20140925 Year of fee payment: 20 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: DE Payment date: 20141028 Year of fee payment: 20 Ref country code: FR Payment date: 20140924 Year of fee payment: 20 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R071 Ref document number: 69535013 Country of ref document: DE |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: PE20 Expiry date: 20151024 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: GB Free format text: LAPSE BECAUSE OF EXPIRATION OF PROTECTION Effective date: 20151024 |